US20080127154A1 - Methods and systems for optimization in a run-time environment - Google Patents
Methods and systems for optimization in a run-time environment Download PDFInfo
- Publication number
- US20080127154A1 US20080127154A1 US11/563,919 US56391906A US2008127154A1 US 20080127154 A1 US20080127154 A1 US 20080127154A1 US 56391906 A US56391906 A US 56391906A US 2008127154 A1 US2008127154 A1 US 2008127154A1
- Authority
- US
- United States
- Prior art keywords
- run
- function
- objects
- entry
- symbol table
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
- G06F9/45516—Runtime code conversion or optimisation
- G06F9/45525—Optimisation or modification within the same instruction set architecture, e.g. HP Dynamo
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/41—Compilation
- G06F8/44—Encoding
- G06F8/443—Optimisation
Definitions
- This invention relates generally to run-time environments, more particularly, to methods and systems for optimizing run-time environments.
- the underlying computing platform may provide run-time libraries, which are used by all software applications. Every non-trivial software application relies on other libraries so as not to repeat already existing functions, i.e., not to Stahl the wheel. These libraries are not actually made part of the program binary because of severe consequences. Instead, the libraries and the associated functions are used when referenced, symbolically or by direct reference. Thus, it is up to the run-time linker to assemble the complete image of the software application so it can be executed. Accordingly, the run-time linker has the responsibility of loading all the dependencies, i.e., the libraries the software application relies on, and resolve the actual function and variable references.
- the function and variable resolution is designed to be efficient and speedy.
- the runtime linker has to find the one instance of the function or variable which is referenced merely by its name. In other implementations the static linker might make the decision, also by the name alone.
- this has led to some drawbacks and disadvantages.
- libraries or respective object files
- This has a high cost since each of the variant of the object file has to be quality assured before distribution. This applies even to the code in the library which is shared between all variants.
- a roadblock for implementing multiple definitions for a symbol in current systems is that the run-time or static linker is the mechanism that makes the decision. Unfortunately, it is impractical and unwanted to embed the knowledge to pick the best variant into the run-time or static linker. The list of such rules is likely to be open-ended and even controversial. In the case of the static linker can the decision not be made at all since the execution environment is not known. The preferable solution is to leave the selection of the best variant to the author of the library who knows exactly what s/he had in mind when creating the library.
- FIG. 1A illustrates a conventional software environment
- FIG. 1B illustrates the conventional data structure of an executable
- FIG. 2 illustrates a simplified overview of a conventional function resolution by a run-time linker
- FIG. 3 illustrates an exemplary data structure for the optimizing run-time linker in accordance with an embodiment
- FIG. 4 illustrates function resolution by the optimizing run-time linker in accordance with another embodiment
- FIG. 5 illustrates an exemplary flow diagram executed by the optimizing run-time linker in accordance with yet another embodiment
- FIG. 6 illustrates an exemplary computing platform for the embodiments shown in FIGS. 3-5 .
- Embodiments relate generally to methods, apparatus, and systems for using optimized functions in a run-time environment. More particularly, a method to refine the results of a symbol resolution based on feedback.
- the optimizing linker searches through the symbol tables of loaded objects of an invoked application to locate definitions for the symbols, the linker may encounter special matching table entry in the symbol table.
- the optimizing run-time linker is configured to execute the callback function that is addressed by the value in the special table entry.
- the callback function may determine the characteristics of the actual execution environment (e.g., type of CPU, operating system version, peripherals, etc.). The callback function may then return an address of an optimized function which is used in place of the value of the original symbol in the symbol table based on the execution environment.
- the use of the callback function can be advantageous in enabling new features in microprocessors or operating systems which cannot be used by default.
- existing libraries and/or programs are typically written optimized for a particular version of a microprocessor as an example.
- the existing libraries and/or programs have to be extended or replaced with versions containing optimized versions of the function to capture the latest features of later models of the microprocessors. This oftentimes involves providing separate object files with just the replaced functions for the microprocessor variants. Doing this means additional costs at runtime since another object has to be loaded, bringing with it all the extra one-time and recurring costs associated with it. Alternatively the whole library can be replaced. There is a high cost associated with this approach, too, since each of the object files has to be quality assured individually for distribution.
- an author may write a callback function in accordance with various embodiments that can determine the most relevant implementation based on characteristics of the runtime environment and have the callback function be called by the runtime linker through the special symbol table entry.
- the existing libraries and/or programs can transparently call and use the optimal function implementation for their execution environment by using the special table entry.
- FIG. 1A illustrates a conventional software environment 100 in accordance with an embodiment. It should be readily apparent to those of ordinary skill in the art that the software environment 100 depicted in FIG. 1A represents a generalized schematic illustration and that other components may be added or existing components may be removed or modified.
- the software environment 100 may include an operating system 105 .
- the operating system 105 may be a version of a LinuxTM, UNIXTM, WindowsTM, or similar multitasking operating system.
- a run-time environment 110 may be configured to execute on the operating system 105 .
- the run-time environment 110 may provide a set of software that supports the execution of applications/programs.
- the run-time environment 110 may include an application program interface (“API”, not shown) and a complementary API (not shown) within an application 115 .
- the API may be configured to provide a set of routines that the application 115 uses to request lower-level services performed by the operating system 105 .
- the operating system 105 may include a kernel 120 .
- the kernel 120 may be configured to provide secure access to the underlying hardware of a processor.
- the kernel 120 may also be configured to provide access to run-time libraries 125 A for application 115 .
- the run-time libraries may comprise multiple object files, which contain various library of functions such as GNU C Standard Library (“glibc”), C++ Standard Library, Common Language Runtime, etc.
- Each of the object files in the run-time libraries may contain a symbol table (not shown).
- the kernel 120 may execute a run-time linker 130 in response to an invocation of the application 115 .
- Objects 125 B may be objects that are stored on a peripheral(s), which are loaded as part of application 115 .
- the run-time linker 130 can be configured to determine and load dependencies of the application 115 such as the run-time libraries 125 A or object 125 B.
- the run-time linker 130 may also, if needed, relocate application 115 and its dependencies.
- the run-time linker 130 may be further configured to initialize the application 115 and dependencies in the correct order.
- FIG. 1B illustrates a conventional set of data structures used by the run-time linker 130 .
- the run-time linker 130 depicted in FIG. 1 represents a generalized schematic illustration and that other components may be added or existing components may be removed or modified.
- the run-time linker 130 may be implemented using software components, hardware components, or combinations thereof.
- the software components may be implemented using a variety of computer languages such as C, C++, JAVA, etc.
- the run-time linker 130 's central part comprises of the program code implementing the run-time linker 130 .
- the run-time linker 130 may support executable and linking format (“ELF”) and. in other embodiments, the run-time linker 130 may support Extended Common Object File Format (“ECOFF”).
- ELF executable and linking format
- ECOFF Extended Common Object File Format
- the main module 135 may be configured to use at least two processor specific tables, the Global Offset Table (labeled as GOT) 140 and the Procedure Linkage Table (labeled as PLT) 145 for each loaded object.
- the main module 135 may support position independent code (“PIC”) through the GOT 140 in each library 125 .
- the GOT 140 may be configured to store the absolute addresses of all of the static data referenced in the program. The address of the GOT 140 may be determined through a machine-dependent way.
- the executables that use the shared libraries and the shared library each may have a PLT. Similar to how the GOT 140 redirects any position-independent address calculations to absolute locations, the PLT 140 redirects position-independent function calls to absolute locations.
- the main module 135 may also be configured to interface with .DYNSYM 150 , which contains all of the file's imported and exported symbols.
- the main module 135 may be further configured to interface with DYNSTR 155 , which contains name strings for the symbols, .HASH 160 which a runtime linker can use to lookup symbols quickly, and .DYNAMIC 165 , which is a list of tagged values and pointers.
- the .DYNAMIC 165 may be configured to contain the following tag types.
- a DT_STRTAB 170 may be configured to hold the address of a string table 175 .
- a DT_SYMTAB 180 may be configured to store the address of the symbol table 185 .
- FIG. 2 illustrates a diagram 200 of conventional linking of two objects for a call instruction, call fct, in a first object of a function that is implemented in the second object in conjunction with FIG. 1 B.
- object 1 205 was initially created, it was not known where the actual implementation of fct resides (in object 2 210 ). Accordingly, an indirection is used to locate the address of fct function at runtime. More particularly, the call to fct is redirected into the PLT 145 (shown in FIG. 1B ).
- the PLT 145 contains a little code for each referenced function, which basically is a single indirect jump instruction.
- the content of the PLT 145 cannot be changed so the address of the called function is kept in yet another data structure, the GOT 140 .
- the indirect jump in the PLT 215 will fetch the value of this GOT entry and transfer control over to the location specified by the value, object 2 210 .
- the address stored in the GOT entry can be the implementation of fct in object 2 210 .
- the final address is computed by the run-time linker at software application startup time or when the PLT entry is used for the first time.
- the run-time linker looks through all the loaded objects in a specified order and determines where a suitable definition of the function, fct, can be found.
- Each object contains a symbol table where the run-time linker searches to locate a matching definition.
- the symbol table 225 of object 210 has a record for a function, fct, which refers to the local definition of the function. Accordingly, FIG. 2 illustrates how a conventional run-time resolves symbols and/or functions at startup time.
- FIG. 3 illustrates a simplified block diagram of the optimal run-time linker 300 .
- the optimal run-time linker 300 may be configured to have at least the same functionality as the conventional run-time linker 130 . Accordingly, the description of the common features in FIG. 3 are omitted and the description features with respect to FIG. 2 are being relied upon to provide to provide adequate descriptions of the common features.
- the optimizing run-time linker 300 can also be told about an optimized definition for a symbol based on at least one characteristic of the run-time environment.
- the main module 135 ′ may be configured to recognize a new, special type of entry in the symbol tables of the object files of an application and/or run-time libraries.
- the special symbol entry is configured to reference an address of a callback function, which the run-time linker 300 has to execute to retrieve the final address.
- FIG. 4 illustrates a block diagram 400 how the special symbol entry and the optimal function interact.
- a call instruction to a function fct may need to be resolved.
- the initial GOT content makes the PLT entry call to the run-time linker 300 .
- the run-time linker 300 may be configured to scan the symbol table 410 in the target object 405 .
- the run-time linker 300 uses the function name associated with the PLT entry to locate a matching symbol table entry in the target object 405 's symbol table 410 .
- the target object 405 comprises at least one special symbol entry 415 in the symbol table 410 among conventional symbol entries.
- the function, fct is a special symbol entry.
- the difference between a special table entry and the conventional table entry is that the conventional symbol table entry points to the function which is gets finally used directly while the special symbol table entry points to a callback function which has to be called to determine the final address. Accordingly, the run-time linker 300 may then call the callback function 435 addressed by the special symbol table entry.
- the target object 405 may be configured to store at least one variant of the function, fct, optimized for a respective configuration. In some embodiments, the target object 405 may be configured to store multiple variants fct 1 . . . fct N 440 of the function, fct, where each variant has been optimized for a respective configuration.
- the callback function 435 may select an optimized fct for an Intel processor (fct 1 ), an AMD processor (fct 2 ), or an operating system version (fct k ).
- the callback function 435 may be implemented as a function that can initially determine the characteristics of the run-time environment such as processor type, operating system version, etc., as known to those skilled in the art. Other examples include support for different multi-media extensions support by the processors and support for newer system calls into the operating system which are missing in earlier versions.
- the callback function 435 may then be configured to select the appropriate variant of the function, fct A , which is then identified by its address.
- the address of the selected function 445 may then be returned to the run-time linker 300 which stores it at in the GOT entry 450 (i.e., GOTfct). From then on all calls to fct through the PLT entry 425 will be directly referred to the selected function fct A .
- FIG. 5 illustrates a flow diagram executed by the main module 135 ′ of the run-time linker 300 in accordance with another embodiment. It should be readily apparent to those of ordinary skill in the art that the flow diagram 500 depicted in FIG. 5 represents a generalized schematic illustration and that other steps may be added or existing steps may be removed or modified.
- the main module 1351 may be configured to start loading the dependencies from the object files of the run-time libraries and/or application libraries of the underlying computing platform and initiate resolution of functions and/or variable references, in step 505 .
- the main module 135 ′ may be configured to search the symbol tables of the loaded object files for the function and/or variable referenced in the relocation record for the symbol reference, in step 510 .
- the main module 135 may be configured to determine the type of entry, in step 515 . If the entry is a conventional entry, the main module 135 ′ may be configured to resolve the function and/or variable as previously discussed with respect to FIG. 2 , in step 520 . Subsequently, the main module 135 ′ may proceed to the next unresolved function and/or variable, in step 510 .
- the main module 135 ′ may be configured to execute the callback function referenced by the value in the special symbol table entry, in step 525 .
- the main module 135 ′ may execute the callback function.
- the callback function may be configured to determine at least one characteristic of the run-time environment, e.g., type of processor, operating system version, etc., and select an optimized variation of the called function.
- the callback function then returns the address of the optimized function to the main module 135 ′, in step 540 .
- the main module 135 ′ may proceed to the next unresolved function and/or variable, in step 510 . It is also possible to delay the processing of the symbol table entries and determine the function address with a call to the callback function when the symbol table is used for the first time, as illustrated in FIG. 4 .
- FIG. 6 illustrates an exemplary block diagram of a computing platform 600 where an embodiment may be practiced.
- the functions of the embodiments of the present invention of the optimizing run-time linker may be implemented in program code and executed by the computing platform 600 .
- the run-time linker may be implemented in computer languages such as PASCAL, C, C++, JAVA, etc.
- the computer system 600 includes one or more processors, such as processor 602 that provide an execution platform for embodiments of the optimal run-time linker. Commands and data from the processor 602 are communicated over a communication bus 604 .
- the computer system 600 also includes a main memory 606 , such as a Random Access Memory (RAM), where the optimal run-time linker may be executed during runtime, and a secondary memory 608 .
- the secondary memory 608 includes, for example, a hard disk drive 610 and/or a removable storage drive 612 , representing a floppy diskette drive, a magnetic tape drive, a compact disk drive, etc., where a copy of a computer program embodiment for the optimal run-time linker may be stored.
- the removable storage drive 612 reads from and/or writes to a removable storage unit 614 in a well-known manner.
- a user interfaces with the optimal run-time linker with a keyboard 616 , a mouse 618 , and a display 620 .
- a display adapter 622 interfaces with the communication bus 604 and the display 620 .
- the display adapter also receives display data from the processor 602 and converts the display data into display commands for the display 620 .
- the computer program may exist in a variety of forms both active and inactive.
- the computer program can exist as software program(s) comprised of program instructions in source code, object code, executable code or other formats; firmware program(s); or hardware description language (HDL) files.
- Any of the above can be embodied on a computer readable medium, which include storage devices and signals, in compressed or uncompressed form.
- Exemplary computer readable storage devices include conventional computer system RAM (random access memory), ROM (read-only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes.
- Exemplary computer readable signals are signals that a computer system hosting or running the present invention can be configured to access, including signals downloaded through the Internet or other networks.
- Concrete examples of the foregoing include distribution of executable software program(s) of the computer program on a CD-ROM or via Internet download.
- the Internet itself, as an abstract entity, is a computer readable medium. The same is true of computer networks in general.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
Description
- This invention relates generally to run-time environments, more particularly, to methods and systems for optimizing run-time environments.
- It is generally well known that a software application is assembled from multiple pieces when invoked. The underlying computing platform (personal computer, client, etc.) may provide run-time libraries, which are used by all software applications. Every non-trivial software application relies on other libraries so as not to repeat already existing functions, i.e., not to reinvent the wheel. These libraries are not actually made part of the program binary because of severe consequences. Instead, the libraries and the associated functions are used when referenced, symbolically or by direct reference. Thus, it is up to the run-time linker to assemble the complete image of the software application so it can be executed. Accordingly, the run-time linker has the responsibility of loading all the dependencies, i.e., the libraries the software application relies on, and resolve the actual function and variable references.
- The function and variable resolution is designed to be efficient and speedy. The runtime linker has to find the one instance of the function or variable which is referenced merely by its name. In other implementations the static linker might make the decision, also by the name alone. However, this has led to some drawbacks and disadvantages. For example, when new processors or new versions of an operating system are introduced, software applications may want to modify their libraries to utilize the latest features of the processors/operating system. Accordingly, libraries (or respective object files) are created for each variant of the processor/operating system feature. This has a high cost since each of the variant of the object file has to be quality assured before distribution. This applies even to the code in the library which is shared between all variants. Thus, it would be desirable to have one symbol refer to a set of functions, each function optimized for a particular variant of processor/operating system feature.
- A roadblock for implementing multiple definitions for a symbol in current systems is that the run-time or static linker is the mechanism that makes the decision. Unfortunately, it is impractical and unwanted to embed the knowledge to pick the best variant into the run-time or static linker. The list of such rules is likely to be open-ended and even controversial. In the case of the static linker can the decision not be made at all since the execution environment is not known. The preferable solution is to leave the selection of the best variant to the author of the library who knows exactly what s/he had in mind when creating the library.
- Various features of the embodiments can be more fully appreciated, as the same become better understood with reference to the following detailed description of an embodiment when considered in connection with the accompanying figures, in which:
-
FIG. 1A illustrates a conventional software environment; -
FIG. 1B illustrates the conventional data structure of an executable; -
FIG. 2 illustrates a simplified overview of a conventional function resolution by a run-time linker; -
FIG. 3 illustrates an exemplary data structure for the optimizing run-time linker in accordance with an embodiment; -
FIG. 4 illustrates function resolution by the optimizing run-time linker in accordance with another embodiment; -
FIG. 5 illustrates an exemplary flow diagram executed by the optimizing run-time linker in accordance with yet another embodiment; and -
FIG. 6 illustrates an exemplary computing platform for the embodiments shown inFIGS. 3-5 . - For simplicity and illustrative purposes, the principles of the present invention are described by referring mainly to exemplary embodiments thereof. However, one of ordinary skill in the art would readily recognize that the same principles are equally applicable to, and can be implemented in, all types of computing systems, and that any such variations do not depart from the true spirit and scope of the present invention. Specifically, the following description assumes the separate existence of a runtime-linker. This is not necessarily the case, the functionality can be implemented as part of the application itself. Furthermore, the description will concentrate on linking at runtime. Similar problems exist when the static linker makes the decisions. In this case it is possible to refine the decision at runtime. Moreover, in the following detailed description, references are made to the accompanying figures, which illustrate specific embodiments. Electrical, mechanical, logical and structural changes may be made to the embodiments without departing from the spirit and scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense and the scope of the present invention is defined by the appended claims and their equivalents.
- Embodiments relate generally to methods, apparatus, and systems for using optimized functions in a run-time environment. More particularly, a method to refine the results of a symbol resolution based on feedback. As the optimizing linker searches through the symbol tables of loaded objects of an invoked application to locate definitions for the symbols, the linker may encounter special matching table entry in the symbol table. Unlike a conventional linker that would return the matching definition, the optimizing run-time linker is configured to execute the callback function that is addressed by the value in the special table entry. The callback function may determine the characteristics of the actual execution environment (e.g., type of CPU, operating system version, peripherals, etc.). The callback function may then return an address of an optimized function which is used in place of the value of the original symbol in the symbol table based on the execution environment.
- The use of the callback function can be advantageous in enabling new features in microprocessors or operating systems which cannot be used by default. More specifically, existing libraries and/or programs are typically written optimized for a particular version of a microprocessor as an example. The existing libraries and/or programs have to be extended or replaced with versions containing optimized versions of the function to capture the latest features of later models of the microprocessors. This oftentimes involves providing separate object files with just the replaced functions for the microprocessor variants. Doing this means additional costs at runtime since another object has to be loaded, bringing with it all the extra one-time and recurring costs associated with it. Alternatively the whole library can be replaced. There is a high cost associated with this approach, too, since each of the object files has to be quality assured individually for distribution. To prevent these costs, an author may write a callback function in accordance with various embodiments that can determine the most relevant implementation based on characteristics of the runtime environment and have the callback function be called by the runtime linker through the special symbol table entry. Thus, the existing libraries and/or programs can transparently call and use the optimal function implementation for their execution environment by using the special table entry.
-
FIG. 1A illustrates aconventional software environment 100 in accordance with an embodiment. It should be readily apparent to those of ordinary skill in the art that thesoftware environment 100 depicted inFIG. 1A represents a generalized schematic illustration and that other components may be added or existing components may be removed or modified. - As shown in
FIG. 1A , thesoftware environment 100 may include anoperating system 105. Theoperating system 105 may be a version of a Linux™, UNIX™, Windows™, or similar multitasking operating system. A run-time environment 110 may be configured to execute on theoperating system 105. The run-time environment 110 may provide a set of software that supports the execution of applications/programs. The run-time environment 110 may include an application program interface (“API”, not shown) and a complementary API (not shown) within anapplication 115. The API may be configured to provide a set of routines that theapplication 115 uses to request lower-level services performed by theoperating system 105. Theoperating system 105 may include akernel 120. Thekernel 120 may be configured to provide secure access to the underlying hardware of a processor. - The
kernel 120 may also be configured to provide access to run-time libraries 125A forapplication 115. The run-time libraries may comprise multiple object files, which contain various library of functions such as GNU C Standard Library (“glibc”), C++ Standard Library, Common Language Runtime, etc. Each of the object files in the run-time libraries may contain a symbol table (not shown). - The
kernel 120 may execute a run-time linker 130 in response to an invocation of theapplication 115.Objects 125B may be objects that are stored on a peripheral(s), which are loaded as part ofapplication 115. The run-time linker 130 can be configured to determine and load dependencies of theapplication 115 such as the run-time libraries 125A or object 125B. The run-time linker 130 may also, if needed, relocateapplication 115 and its dependencies. The run-time linker 130 may be further configured to initialize theapplication 115 and dependencies in the correct order. -
FIG. 1B illustrates a conventional set of data structures used by the run-time linker 130. It should be readily apparent to those of ordinary skill in the art that the run-time linker 130 depicted inFIG. 1 represents a generalized schematic illustration and that other components may be added or existing components may be removed or modified. Moreover, the run-time linker 130 may be implemented using software components, hardware components, or combinations thereof. The software components may be implemented using a variety of computer languages such as C, C++, JAVA, etc. - As shown in
FIG. 1B , the run-time linker 130's central part comprises of the program code implementing the run-time linker 130. In some embodiments, the run-time linker 130 may support executable and linking format (“ELF”) and. in other embodiments, the run-time linker 130 may support Extended Common Object File Format (“ECOFF”). Accordingly, themain module 135 may be configured to use at least two processor specific tables, the Global Offset Table (labeled as GOT) 140 and the Procedure Linkage Table (labeled as PLT) 145 for each loaded object. Themain module 135 may support position independent code (“PIC”) through theGOT 140 in each library 125. TheGOT 140 may be configured to store the absolute addresses of all of the static data referenced in the program. The address of theGOT 140 may be determined through a machine-dependent way. - With reference to the
PLT 145, the executables that use the shared libraries and the shared library each may have a PLT. Similar to how theGOT 140 redirects any position-independent address calculations to absolute locations, thePLT 140 redirects position-independent function calls to absolute locations. - The
main module 135 may also be configured to interface with .DYNSYM 150, which contains all of the file's imported and exported symbols. Themain module 135 may be further configured to interface withDYNSTR 155, which contains name strings for the symbols, .HASH 160 which a runtime linker can use to lookup symbols quickly, and .DYNAMIC 165, which is a list of tagged values and pointers. - The .
DYNAMIC 165 may be configured to contain the following tag types. ADT_STRTAB 170 may be configured to hold the address of a string table 175. ADT_SYMTAB 180 may be configured to store the address of the symbol table 185. -
FIG. 2 illustrates a diagram 200 of conventional linking of two objects for a call instruction, call fct, in a first object of a function that is implemented in the second object in conjunction withFIG. 1 B. As shown, whenobject 1 205 was initially created, it was not known where the actual implementation of fct resides (inobject 2 210). Accordingly, an indirection is used to locate the address of fct function at runtime. More particularly, the call to fct is redirected into the PLT 145 (shown inFIG. 1B ). ThePLT 145 contains a little code for each referenced function, which basically is a single indirect jump instruction. For most architectures, the content of thePLT 145 cannot be changed so the address of the called function is kept in yet another data structure, theGOT 140. The indirect jump in thePLT 215 will fetch the value of this GOT entry and transfer control over to the location specified by the value,object 2 210. The address stored in the GOT entry can be the implementation of fct inobject 2 210. - The final address is computed by the run-time linker at software application startup time or when the PLT entry is used for the first time. At this point, the run-time linker looks through all the loaded objects in a specified order and determines where a suitable definition of the function, fct, can be found. Each object contains a symbol table where the run-time linker searches to locate a matching definition. As shown in
FIG. 2 , the symbol table 225 ofobject 210 has a record for a function, fct, which refers to the local definition of the function. Accordingly,FIG. 2 illustrates how a conventional run-time resolves symbols and/or functions at startup time. -
FIG. 3 illustrates a simplified block diagram of the optimal run-time linker 300. The optimal run-time linker 300 may be configured to have at least the same functionality as the conventional run-time linker 130. Accordingly, the description of the common features inFIG. 3 are omitted and the description features with respect toFIG. 2 are being relied upon to provide to provide adequate descriptions of the common features. - As shown, the optimizing run-
time linker 300 can also be told about an optimized definition for a symbol based on at least one characteristic of the run-time environment. More specifically, themain module 135′ may be configured to recognize a new, special type of entry in the symbol tables of the object files of an application and/or run-time libraries. The special symbol entry is configured to reference an address of a callback function, which the run-time linker 300 has to execute to retrieve the final address. For example, using the call instruction from an earlier example, call fct (seeFIG. 2 ),FIG. 4 illustrates a block diagram 400 how the special symbol entry and the optimal function interact. - As shown in
FIG. 4 , a call instruction to a function fct may need to be resolved. The initial GOT content makes the PLT entry call to the run-time linker 300. The run-time linker 300 may be configured to scan the symbol table 410 in thetarget object 405. The run-time linker 300 uses the function name associated with the PLT entry to locate a matching symbol table entry in thetarget object 405's symbol table 410. Thetarget object 405 comprises at least onespecial symbol entry 415 in the symbol table 410 among conventional symbol entries. For this example, the function, fct, is a special symbol entry. The difference between a special table entry and the conventional table entry is that the conventional symbol table entry points to the function which is gets finally used directly while the special symbol table entry points to a callback function which has to be called to determine the final address. Accordingly, the run-time linker 300 may then call thecallback function 435 addressed by the special symbol table entry. - The
target object 405 may be configured to store at least one variant of the function, fct, optimized for a respective configuration. In some embodiments, thetarget object 405 may be configured to store multiple variants fct1 . . . fctN 440 of the function, fct, where each variant has been optimized for a respective configuration. When called by the run-time linker 300, thecallback function 435 may select an optimized fct for an Intel processor (fct1), an AMD processor (fct2), or an operating system version (fctk). Accordingly, thecallback function 435 may be implemented as a function that can initially determine the characteristics of the run-time environment such as processor type, operating system version, etc., as known to those skilled in the art. Other examples include support for different multi-media extensions support by the processors and support for newer system calls into the operating system which are missing in earlier versions. Thecallback function 435 may then be configured to select the appropriate variant of the function, fctA, which is then identified by its address. The address of the selectedfunction 445 may then be returned to the run-time linker 300 which stores it at in the GOT entry 450 (i.e., GOTfct). From then on all calls to fct through thePLT entry 425 will be directly referred to the selected function fctA. -
FIG. 5 illustrates a flow diagram executed by themain module 135′ of the run-time linker 300 in accordance with another embodiment. It should be readily apparent to those of ordinary skill in the art that the flow diagram 500 depicted inFIG. 5 represents a generalized schematic illustration and that other steps may be added or existing steps may be removed or modified. - As shown in
FIG. 5 , the main module 1351 may be configured to start loading the dependencies from the object files of the run-time libraries and/or application libraries of the underlying computing platform and initiate resolution of functions and/or variable references, instep 505. - For each used function and/or variable, the
main module 135′ may be configured to search the symbol tables of the loaded object files for the function and/or variable referenced in the relocation record for the symbol reference, instep 510. - For a matching entry in the symbol table, the
main module 135 may be configured to determine the type of entry, instep 515. If the entry is a conventional entry, themain module 135′ may be configured to resolve the function and/or variable as previously discussed with respect toFIG. 2 , instep 520. Subsequently, themain module 135′ may proceed to the next unresolved function and/or variable, instep 510. - Returning to step 515, if the
main module 135 determines that the type of entry is special symbol entry, themain module 135′ may be configured to execute the callback function referenced by the value in the special symbol table entry, instep 525. - In
step 525, themain module 135′ may execute the callback function. The callback function may be configured to determine at least one characteristic of the run-time environment, e.g., type of processor, operating system version, etc., and select an optimized variation of the called function. The callback function then returns the address of the optimized function to themain module 135′, in step 540. Subsequently, themain module 135′ may proceed to the next unresolved function and/or variable, instep 510. It is also possible to delay the processing of the symbol table entries and determine the function address with a call to the callback function when the symbol table is used for the first time, as illustrated inFIG. 4 . -
FIG. 6 illustrates an exemplary block diagram of acomputing platform 600 where an embodiment may be practiced. The functions of the embodiments of the present invention of the optimizing run-time linker may be implemented in program code and executed by thecomputing platform 600. The run-time linker may be implemented in computer languages such as PASCAL, C, C++, JAVA, etc. - As shown in
FIG. 6 , thecomputer system 600 includes one or more processors, such asprocessor 602 that provide an execution platform for embodiments of the optimal run-time linker. Commands and data from theprocessor 602 are communicated over acommunication bus 604. Thecomputer system 600 also includes amain memory 606, such as a Random Access Memory (RAM), where the optimal run-time linker may be executed during runtime, and asecondary memory 608. Thesecondary memory 608 includes, for example, ahard disk drive 610 and/or aremovable storage drive 612, representing a floppy diskette drive, a magnetic tape drive, a compact disk drive, etc., where a copy of a computer program embodiment for the optimal run-time linker may be stored. Theremovable storage drive 612 reads from and/or writes to aremovable storage unit 614 in a well-known manner. A user interfaces with the optimal run-time linker with akeyboard 616, amouse 618, and adisplay 620. Adisplay adapter 622 interfaces with thecommunication bus 604 and thedisplay 620. The display adapter also receives display data from theprocessor 602 and converts the display data into display commands for thedisplay 620. - Certain embodiments may be performed as a computer program. The computer program may exist in a variety of forms both active and inactive. For example, the computer program can exist as software program(s) comprised of program instructions in source code, object code, executable code or other formats; firmware program(s); or hardware description language (HDL) files. Any of the above can be embodied on a computer readable medium, which include storage devices and signals, in compressed or uncompressed form. Exemplary computer readable storage devices include conventional computer system RAM (random access memory), ROM (read-only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes. Exemplary computer readable signals, whether modulated using a carrier or not, are signals that a computer system hosting or running the present invention can be configured to access, including signals downloaded through the Internet or other networks. Concrete examples of the foregoing include distribution of executable software program(s) of the computer program on a CD-ROM or via Internet download. In a sense, the Internet itself, as an abstract entity, is a computer readable medium. The same is true of computer networks in general.
- While the invention has been described with reference to the exemplary embodiments thereof, those skilled in the art will be able to make various modifications to the described embodiments without departing from the true spirit and scope. The terms and descriptions used herein are set forth by way of illustration only and are not meant as limitations. In particular, although the method has been described by examples, the steps of the method may be performed in a different order than illustrated or simultaneously. Those skilled in the art will recognize that these and other variations are possible within the spirit and scope as defined in the following claims and their equivalents.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/563,919 US7926047B2 (en) | 2006-11-28 | 2006-11-28 | Methods and systems for optimization in a run-time environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/563,919 US7926047B2 (en) | 2006-11-28 | 2006-11-28 | Methods and systems for optimization in a run-time environment |
Publications (2)
Publication Number | Publication Date |
---|---|
US20080127154A1 true US20080127154A1 (en) | 2008-05-29 |
US7926047B2 US7926047B2 (en) | 2011-04-12 |
Family
ID=39465414
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/563,919 Active 2029-11-12 US7926047B2 (en) | 2006-11-28 | 2006-11-28 | Methods and systems for optimization in a run-time environment |
Country Status (1)
Country | Link |
---|---|
US (1) | US7926047B2 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080288919A1 (en) * | 2007-05-14 | 2008-11-20 | Microsoft Corporation | Encoding of Symbol Table in an Executable |
US20080288666A1 (en) * | 2007-05-14 | 2008-11-20 | Microsoft Corporation | Embedded System Development Platform |
US20090182720A1 (en) * | 2008-01-15 | 2009-07-16 | Cain Michael W | Maintained Symbol Table Only Index |
US20110113409A1 (en) * | 2009-11-10 | 2011-05-12 | Rodrick Evans | Symbol capabilities support within elf |
US20140149968A1 (en) * | 2012-11-23 | 2014-05-29 | Samsung Electronics Co., Ltd. | Dynamic library profiling method and dynamic library profiling system |
US20150007197A1 (en) * | 2012-04-27 | 2015-01-01 | Travis S. Tripp | Mapping application dependencies at runtime |
US20150106797A1 (en) * | 2013-10-14 | 2015-04-16 | International Business Machines Corporation | Dynamic code selection based on data policies |
US20150317042A1 (en) * | 2014-05-02 | 2015-11-05 | Lexmark International Technology, S.A. | System and Methods for Loading an Application and its Modules in a Client Device |
US9250881B1 (en) * | 2014-09-30 | 2016-02-02 | International Business Machines Corporation | Selection of an entry point of a function having multiple entry points |
US20170212827A1 (en) * | 2016-01-22 | 2017-07-27 | International Business Machines Corporation | Enhanced policy editor with completion support and on demand validation |
US10402187B2 (en) * | 2016-08-10 | 2019-09-03 | Trilio Data Inc. | Efficient workload deployment using containers and unikernels |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8572594B2 (en) * | 2010-12-22 | 2013-10-29 | Microsoft Corporation | Invasion analysis to identify open types |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5659753A (en) * | 1991-02-27 | 1997-08-19 | Digital Equipment Corporation | Interface for symbol table construction in a multilanguage optimizing compiler |
US6091897A (en) * | 1996-01-29 | 2000-07-18 | Digital Equipment Corporation | Fast translation and execution of a computer program on a non-native architecture by use of background translator |
US6158049A (en) * | 1998-08-11 | 2000-12-05 | Compaq Computer Corporation | User transparent mechanism for profile feedback optimization |
US6247174B1 (en) * | 1998-01-02 | 2001-06-12 | Hewlett-Packard Company | Optimization of source code with embedded machine instructions |
US6324688B1 (en) * | 1998-07-30 | 2001-11-27 | International Business Machines Corporation | Method and apparatus for optimizing execution of Java programs |
US6678886B2 (en) * | 1998-12-22 | 2004-01-13 | Fujitsu Limited | Apparatus and method for generating optimization objects |
US20040064809A1 (en) * | 2002-09-26 | 2004-04-01 | Shin-Ming Liu | System and method for optimizing a program |
US6820258B1 (en) * | 2000-08-28 | 2004-11-16 | International Business Machines Corporation | System and method for dynamically optimizing executing activations |
US7721274B1 (en) * | 2004-05-05 | 2010-05-18 | Sun Microsystems, Inc. | Intelligent processing of external object references for dynamic linking |
-
2006
- 2006-11-28 US US11/563,919 patent/US7926047B2/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5659753A (en) * | 1991-02-27 | 1997-08-19 | Digital Equipment Corporation | Interface for symbol table construction in a multilanguage optimizing compiler |
US6091897A (en) * | 1996-01-29 | 2000-07-18 | Digital Equipment Corporation | Fast translation and execution of a computer program on a non-native architecture by use of background translator |
US6247174B1 (en) * | 1998-01-02 | 2001-06-12 | Hewlett-Packard Company | Optimization of source code with embedded machine instructions |
US6324688B1 (en) * | 1998-07-30 | 2001-11-27 | International Business Machines Corporation | Method and apparatus for optimizing execution of Java programs |
US6158049A (en) * | 1998-08-11 | 2000-12-05 | Compaq Computer Corporation | User transparent mechanism for profile feedback optimization |
US6678886B2 (en) * | 1998-12-22 | 2004-01-13 | Fujitsu Limited | Apparatus and method for generating optimization objects |
US6820258B1 (en) * | 2000-08-28 | 2004-11-16 | International Business Machines Corporation | System and method for dynamically optimizing executing activations |
US20040064809A1 (en) * | 2002-09-26 | 2004-04-01 | Shin-Ming Liu | System and method for optimizing a program |
US7721274B1 (en) * | 2004-05-05 | 2010-05-18 | Sun Microsystems, Inc. | Intelligent processing of external object references for dynamic linking |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8948184B2 (en) | 2007-05-14 | 2015-02-03 | Microsoft Corporation | Embedded system development platform |
US20080288666A1 (en) * | 2007-05-14 | 2008-11-20 | Microsoft Corporation | Embedded System Development Platform |
US20080288919A1 (en) * | 2007-05-14 | 2008-11-20 | Microsoft Corporation | Encoding of Symbol Table in an Executable |
US8175099B2 (en) | 2007-05-14 | 2012-05-08 | Microsoft Corporation | Embedded system development platform |
US20090182720A1 (en) * | 2008-01-15 | 2009-07-16 | Cain Michael W | Maintained Symbol Table Only Index |
US7792823B2 (en) * | 2008-01-15 | 2010-09-07 | International Business Machines Corporation | Maintained symbol table only index |
US20100287206A1 (en) * | 2008-01-15 | 2010-11-11 | International Business Machines Corporation | Maintained symbol table only index |
US7921102B2 (en) | 2008-01-15 | 2011-04-05 | International Business Machines Corporation | Maintained symbol table only index |
US20110113409A1 (en) * | 2009-11-10 | 2011-05-12 | Rodrick Evans | Symbol capabilities support within elf |
US20150007197A1 (en) * | 2012-04-27 | 2015-01-01 | Travis S. Tripp | Mapping application dependencies at runtime |
US20140149968A1 (en) * | 2012-11-23 | 2014-05-29 | Samsung Electronics Co., Ltd. | Dynamic library profiling method and dynamic library profiling system |
US9959191B2 (en) * | 2012-11-23 | 2018-05-01 | Samsung Electronics Co., Ltd. | Dynamic library profiling method and dynamic library profiling system |
US20150106797A1 (en) * | 2013-10-14 | 2015-04-16 | International Business Machines Corporation | Dynamic code selection based on data policies |
US9606783B2 (en) * | 2013-10-14 | 2017-03-28 | International Business Machines Corporation | Dynamic code selection based on data policies |
US20150317042A1 (en) * | 2014-05-02 | 2015-11-05 | Lexmark International Technology, S.A. | System and Methods for Loading an Application and its Modules in a Client Device |
US9727354B2 (en) * | 2014-05-02 | 2017-08-08 | Kofax International Switzerland Sarl | System and methods for loading an application and its modules in a client device |
US9747117B2 (en) * | 2014-05-02 | 2017-08-29 | Kofax International Switzerland Sarl | System and methods for loading an application and its modules in a client device |
US20150317171A1 (en) * | 2014-05-02 | 2015-11-05 | Lexmark International, Inc. | System and Methods for Loading an Application and its Modules in a Client Device |
US9280333B1 (en) | 2014-09-30 | 2016-03-08 | International Business Machines Corporation | Selection of an entry point of a function having multiple entry points |
US9250881B1 (en) * | 2014-09-30 | 2016-02-02 | International Business Machines Corporation | Selection of an entry point of a function having multiple entry points |
US20170212827A1 (en) * | 2016-01-22 | 2017-07-27 | International Business Machines Corporation | Enhanced policy editor with completion support and on demand validation |
US9940217B2 (en) | 2016-01-22 | 2018-04-10 | International Business Machines Corporation | Enhanced policy editor with completion support and on demand validation |
US10025689B2 (en) * | 2016-01-22 | 2018-07-17 | International Business Machines Corporation | Enhanced policy editor with completion support and on demand validation |
US10372583B2 (en) | 2016-01-22 | 2019-08-06 | International Business Machines Corporation | Enhanced policy editor with completion support and on demand validation |
US10402187B2 (en) * | 2016-08-10 | 2019-09-03 | Trilio Data Inc. | Efficient workload deployment using containers and unikernels |
Also Published As
Publication number | Publication date |
---|---|
US7926047B2 (en) | 2011-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7926047B2 (en) | Methods and systems for optimization in a run-time environment | |
US5778231A (en) | Compiler system and method for resolving symbolic references to externally located program files | |
US6871344B2 (en) | Configurations for binding software assemblies to application programs | |
US7490320B2 (en) | Method and apparatus for transforming Java Native Interface function calls into simpler operations during just-in-time compilation | |
US6944846B2 (en) | Algorithm for localization of a JAVA application using reflection API and a custom class loader | |
US6336213B1 (en) | Method and apparatus for dynamic selection of which bytecodes should be just in time compiled | |
US9116717B2 (en) | Run-time interception of software methods | |
US6003095A (en) | Apparatus and method for demand loading a dynamic link library | |
US6295638B1 (en) | Method and apparatus for loading native object code in data processing system | |
US7287259B2 (en) | Isolating assembly versions for binding to application programs | |
JP5518085B2 (en) | Storing code generated at runtime in the cache | |
US7392527B2 (en) | Driver-specific context for kernel-mode shimming | |
US6637025B1 (en) | Dynamic selection/definition of which class/methods should or should not be jit'ed using information stored in a jar file | |
US20130326489A1 (en) | Method and system for translating non-native instructions | |
US5960197A (en) | Compiler dispatch function for object-oriented C | |
KR20130069555A (en) | Virtual application extension points | |
US6233725B1 (en) | Method and apparatus to coordinate and control the simultaneous use of multiple just in time compilers with a java virtual machine | |
US9411617B2 (en) | System and method for matching synthetically generated inner classes and methods | |
US9063760B2 (en) | Employing native routines instead of emulated routines in an application being emulated | |
KR20040048246A (en) | A java execution device and a java execution method | |
US6324688B1 (en) | Method and apparatus for optimizing execution of Java programs | |
US9183021B2 (en) | Runtime optimization of application bytecode via call transformations | |
US8291401B2 (en) | Processing symbols associated with shared assemblies | |
US9841982B2 (en) | Locating import class files at alternate locations than specified in classpath information | |
EP0950947B1 (en) | Static binding of dynamically dispatched calls in the presence of dynamic linking and loading |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: RED HAT, INC., NORTH CAROLINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DREPPER, ULRICH;REEL/FRAME:018557/0585 Effective date: 20061128 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |